5 Steps to Secure Your Devices & Data

Step 1: Run software updates

Hackers can tell when your phone or computer is not running the latest version. Make sure you enable auto-update on your devices and apps to get security patches automatically.

Step 2: Longer passwords are stronger

Passwords are like vacations–the longer the better! Create a passphrase by using 3 or 4 unrelated words, such as Funny-drink-apple-White. You can also use a password manager, such as LastPass, to remember passwords for you.

How long will it take to hack your password?

A hacker that steals a password file can use an app to crack your password. This is roughly how long it will take based on the length of your password:

Step 3: Encrypt your laptop

To minimize the impact of a lost or stolen computer or phone, turn on encryption and keep an extra copy of your data. Windows, Apple, and Android devices come with whole device encryption and backup functions. ITS is currently encrypting College-owned laptops.

Step 4: Spot a phishing scam before it gets you

Your email account is valuable because it can often be used to reset passwords for other accounts. Be skeptical of emails that threaten to delete your data or close your account. Remember, ITS will never ask for your password via email.

Step 5: Turn on Google 2-Step Verification

In addition to using a strong password, enable Google’s 2-step verification on your Macalester account. For your personal accounts, go to www.turnon2fa.com to find out how to enable 2-step verification for your personal accounts.